Integrity of IoT Network Flow Records in Encrypted Traffic Analytics

2021 ◽  
pp. 177-205
Author(s):  
Aswani Kumar Cherukuri ◽  
Ikram Sumaiya Thaseen ◽  
Gang Li ◽  
Xiao Liu ◽  
Vinamra Das ◽  
...  
2021 ◽  
Author(s):  
Feifei Hu ◽  
Situo Zhang ◽  
Xubin Lin ◽  
Liu Wu ◽  
Niandong Liao ◽  
...  

Abstract Traffic classification has been widely used in network security and network management. Previous research has focused on mapping network traffic to different non­-encrypted applications, However, there are few researches on network traffic classification of encryption applications, especially the underlying traffic of encryption application. In order to solve the above problems, this paper proposes a network encrypted traffic classification model which combines attention mechanism with spatial and temporal characteristics. The model first uses LSTM (Long Short­Term Memory) to analyze the time series of the continuous network flows and find out the time characteristics between the network flows. Secondly, CNN(Convolutional Neural Network) is used to extract the high­-order spatial features of the network flow, and then the high-­order spatial features are weighted and redistributed through the SE(Squeeze­ and­ Excitation)module to obtain the key spatial features of encrypted traffic. Finally, through the two-­stage training and learning , fast classification of network flow is achieved. The main advantages of this model are as follows: 1) the mapping relationship between network flow and corresponding labels is constructed end­-to­-end without manual extraction of network flow characteristics; 2)It has a powerful generalization ability which is able to be compatible with different types of data sets; 3) there is still a high recognition rate for encryption application and the underlying traffic of encryption application. The experimental results show that this model can be well qualified for the classification of non­-encrypted and encrypted application, moreover, greatly improves the classification accuracy of the underlying traffic of encryption application.


1991 ◽  
Vol 138 (1) ◽  
pp. 39 ◽  
Author(s):  
R.E. Rice ◽  
W.M. Grady ◽  
W.G. Lesso ◽  
A.H. Noyola ◽  
M.E. Connolly

2014 ◽  
Vol 1 (1) ◽  
pp. 42-59
Author(s):  
Ibrahim Yusuf ◽  
◽  
Bashir Yusuf
Keyword(s):  

2010 ◽  
Vol 32 (2) ◽  
pp. 267-271 ◽  
Author(s):  
Hui-bin Feng ◽  
Shun-yi Zhang ◽  
Chao Liu ◽  
Jue-fu Liu

Author(s):  
S. Phani Praveen ◽  
T. Bala Murali Krishna ◽  
Sunil K. Chawla ◽  
CH Anuradha

Background: Every organization generally uses a VPN service individually to leather the actual communication. Such communication is actually not allowed by organization monitoring network. But these institutes are not in a position to spend huge amount of funds on secure sockets layer to monitor traffic over their computer networks. Objective: Our work suggests simple technique to block or detect annoying VPN clients inside the network activities. This method does not requires the network to decrypt or even decode any network communication. Method: The proposed solution selects two machine learning techniques Feature Tree and K-means as classifiction techniques which work on time related features. First, the DNS mapping with the ordinary characteristic of the transmission control protocol / internet protocol computer network stack is identified and it is not to be considered as a normal traiffic flow if the domain name information is not available. The process also examines non-standard utilization of hyper text transfer protocol security and also conceal such communication from hyper text transfer protocol security dependent filters in firewall to detect as anomaly in largely. Results: we define the trafic flow as normal trafic flow and VPN traffic flow. These two flows are characterized by taking two machine learning techniques Feature Tree and K-means. We have executed each experment 4 times. As a result, eight types of regular traffics and eight types of VPN traffics were represented. Conclusion: Once trafic flow is identified, it is classified and studied by machine learning techniques. Using time related features, the traffic flow is defined as normal flow or VPN traffic flow.


Author(s):  
Jing-wen Chen ◽  
Yan Xiao ◽  
Hong-she Dang ◽  
Rong Zhang

Background: China's power resources are unevenly distributed in geography, and the supply-demand imbalance becomes worse due to regional economic disparities. It is essential to optimize the allocation of power resources through cross-provincial and cross-regional power trading. Methods: This paper uses load forecasting, transaction subject data declaration, and route optimization models to achieve optimal allocation of electricity and power resources cross-provincial and cross-regional and maximize social benefits. Gray theory is used to predict the medium and longterm loads, while multi-agent technology is used to report the power trading price. Results: Cross-provincial and cross-regional power trading become a network flow problem, through which we can find the optimized complete trading paths. Conclusion: Numerical case study results has verified the efficiency of the proposed method in optimizing power allocation across provinces and regions.


Mathematics ◽  
2021 ◽  
Vol 9 (15) ◽  
pp. 1716
Author(s):  
Adrian Marius Deaconu ◽  
Delia Spridon

Algorithms for network flow problems, such as maximum flow, minimum cost flow, and multi-commodity flow problems, are continuously developed and improved, and so, random network generators become indispensable to simulate the functionality and to test the correctness and the execution speed of these algorithms. For this purpose, in this paper, the well-known Erdős–Rényi model is adapted to generate random flow (transportation) networks. The developed algorithm is fast and based on the natural property of the flow that can be decomposed into directed elementary s-t paths and cycles. So, the proposed algorithm can be used to quickly build a vast number of networks as well as large-scale networks especially designed for s-t flows.


Sign in / Sign up

Export Citation Format

Share Document